Attacks/Breaches

7/3/2018
07:40 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

California's New Privacy Law Gives GDPR-Compliant Orgs Little to Fear

Others should boost their security controls to get in sync with AB 375... or get ready to be sued hundreds of dollars for each personal record exposed in a breach.

California's newly enacted Consumer Privacy Act should have little impact for US organizations that have already implemented measures for complying with the requirements of the European Union's General Data Protection Regulation. But for most others the mandate will likely necessitate a thorough review of their data security controls and in many cases potential updates to them. If not, they risk expensive litigation from their own customers. 

California governor Jerry Brown June 28 signed into law, AB 375, the California Consumer Privacy Act (CCPA) of 2018. The statute - widely seen as one of the toughest privacy laws in the country - will give consumers in the state unprecedented control over any personal information about them that a company might have collected.

Starting Jan. 1, 2020, CCPA confers upon California residents the right to ask a business for all data on them that the business might have collected. It will give consumers the right to ask companies not to sell their personal data to third parties or to ask them to delete all of their personal data.

The bill requires organizations to disclose exactly what categories of personal information it collects about a consumer - before the organization can actually begin to collect the data. Organizations will have to disclose their information collection sources, and the business purpose for collecting personal data and of any changes to those reasons.

Businesses will also have to disclose the categories of third parties with whom they share the information and obtain explicit opt-in consent for collecting data belonging to individuals that are younger than 16 years of age. Importantly, organizations that collect personal data on California residents cannot refuse service or provide lower service quality to individuals that don't want their personal data to be shared or sold to others.

The biggest concern with the new law is the section pertaining to data disclosures resulting from security control failures. CCPA gives individuals the right to sue companies that violate the statute or suffer a data breach because of their failure to implement and maintain reasonable security controls and processes.

"This seems more problematic to the majority of businesses as they struggle to defend themselves against the constant barrage of cyberattacks seeking the very data that the CCPA enumerates," says Chris Prevost, vice president of solutions at Prevoty.

CCPA allows any consumer whose personal data is exposed to sue the breached entity for damages ranging from $100 to $750 or more per exposed record. "Add in all the other breach-related costs - IT response, forensics and recovery, legal, notification, etc. - and this could push a breach into the realm of an existential threat for many businesses."

The law, which privacy rights groups such as the Electronic Privacy Information Center (EPIC) has called  the "most comprehensive consumer privacy state law ever enacted" is the result of a ballot initiative in California that garnered over 660,000 signatures from residents. California's Attorney General's office will have the authority to enforce the law when it goes into effect in 2020.

In intent and in requirements, the California statute is very similar to GDPR. The goal is to give consumers ownership of their personal data; more control over what organizations can do with the data; and the ability to hold businesses liable for failing to adequately protect the data. With California taking the lead many expect it is only a matter of time before other states implement identical statutes.

Some organizations and individuals have criticized the law as being rushed through the state legislature without adequate debate or a chance for organizations to weigh in on the measures.  Robert Callahan, vice president of state government affairs at the Internet Association, describes the law as creating a "massive new regulatory regime" on companies. "The bill was written in a hurried and ill-considered process, and received very little input from those affected by the legislation," Callahan says. "Changes will be necessary as businesses of all types look at implementation." Others have called the bill's language vague and open to interpretation.

However, for enterprise security teams that have implemented practices such as strong access control, data encryption, data anonymization, data minimization, and formal incident response capabilities, CCPA should have relatively little impact.

"It may seem a big demand on organizations, but in reality, it shouldn’t be," said Terry Ray, chief technology officer at Imperva. Many global organizations have already implemented similar requirements for GDPR over the last few years. So organizations that want help implementing CCPA requirements have plenty of existing materials, practices, and products to get started, he said. "Whether it’s serendipitous or planned by California, following GDPR might have helped get organizations ready for CCPA."

 

Related Content:

 

 

 
Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ebyjeeby
100%
0%
ebyjeeby,
User Rank: Strategist
7/9/2018 | 2:55:19 PM
Re: The oligarchs
Why? In a few words, it costs money that they otherwise would not have to spend.
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
7/6/2018 | 11:37:07 AM
Re: The oligarchs
@jenshadus:

> First, if a company doesn't want to be sued because their databases breached, why don't they use encryption.  Even if it slows things down, the data is secured.


While I tend to agree with you, I can point out that perhaps the most common counterargument lies precisely in the lack of business agility that you point out -- which can be particularly problematic when regulatory compliance dictates certain levels of accessibility (as in, for example, certain cases with HIPAA).

But, like I said, I tend to agree with you. It seems that the pendulum could stand to swing a bit more towards security when we are talking about this context of encryption.
jenshadus
50%
50%
jenshadus,
User Rank: Strategist
7/5/2018 | 9:15:46 AM
The oligarchs
There is a lot I do not understand about all this.  First, if a company doesn't want to be sued because their databases breached, why don't they use encryption.  Even if it slows things down, the data is secured.  Or...instead of keeping everything in one database, why not have the active database of a few days and push the older data into an encrypted database.  Second,  I those against this law, which for once I think CA has the right idea, the only ones upset by this are those who might be using the data illegally to start with...the FB, AWS, Google, Yahoo, and other social media.  Companies that collect data from consumers thought emarts provide two options: sign up and have the company keep personal data, or sign in a guest, and I hope they don't keep the data for long.  That would be a breach of trust.
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
Why the CISSP Remains Relevant to Cybersecurity After 28 Years
Steven Paul Romero, SANS Instructor and Sr. SCADA Network Engineer, Chevron,  11/6/2018
5 Reasons Why Threat Intelligence Doesn't Work
Jonathan Zhang, CEO/Founder of WhoisXML API and TIP,  11/7/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-1786
PUBLISHED: 2018-11-12
IBM Spectrum Protect 7.1 and 8.1 dsmc and dsmcad processes incorrectly accumulate TCP/IP sockets in a CLOSE_WAIT state. This can cause TCP/IP resource leakage and may result in a denial of service. IBM X-Force ID: 148871.
CVE-2018-1798
PUBLISHED: 2018-11-12
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force...
CVE-2018-1884
PUBLISHED: 2018-11-12
IBM Case Manager 5.2.0.0, 5.2.0.4, 5.2.1.0, 5.2.1.7, 5.3.0.0, and 5.3.3.0 is vulnerabile to a "zip slip" vulnerability which could allow a remote attacker to execute code using directory traversal techniques. IBM X-Force ID: 151970.
CVE-2018-19203
PUBLISHED: 2018-11-12
PRTG Network Monitor before 18.2.41.1652 allows remote unauthenticated attackers to terminate the PRTG Core Server Service via a special HTTP request.
CVE-2018-19204
PUBLISHED: 2018-11-12
PRTG Network Monitor before 18.3.44.2054 allows a remote authenticated attacker (with read-write privileges) to execute arbitrary code and OS commands with system privileges. When creating an HTTP Advanced Sensor, the user's input in the POST parameter 'proxyport_' is mishandled. The attacker can cr...